• Title/Summary/Keyword: Information protection industry

Search Result 392, Processing Time 0.026 seconds

A study on the information protection to prepare for the change of EC environment (EC 환경변화에 대응하기 위한 정보보호에 관한 연구)

  • 신영균
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.12
    • /
    • pp.1691-1696
    • /
    • 2002
  • The major factors for the information protection to prepare for the change of the EC environment are found to be the construction of internet cyber-mall, the consumer-protecting regulations and the private information and system security regulations. The standards and methods of the their judgement is also important factors and are believed to attract the consumers' interest about the assessment of the internet cyber-mall and eventually serve the rights and interests of the consumers. The technology-level for the business transaction, the research and development of its technology and putting it into practical use are also found to be significant factors.

  • PDF

Healthcare Security based on Blockchain

  • Almalki, Taghreed;Alzahrani, Shahad;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.149-160
    • /
    • 2021
  • One of the most important inventions and developments in the digital world today is the healthcare system based on blockchain technology. Healthcare is an important field that requires the application of security mechanisms due to the sensitivity of patient data. The association of blockchain with healthcare contributed to achieving better security mechanisms than the traditional approach. The new approach operates in a decentralized system, which in turn, improves security in the healthcare environment. Consequently, blockchain technology has emerged as one of the most crucial solutions to security violations and challenges in the healthcare industry. This paper provides a comprehensive review of several experts' recent protection and detection approaches in this domain. It is also imperative to note that the paper focuses only on the recent techniques that have been published during 2017-2020. The sophisticated procedures have been investigated and discussed in terms of similarities and differences to highlight the significance of the protection needed to secure the healthcare environment.

A Study on Public Order Right Based on Analysis of the Administrative Disposition Results Against the Personal Information Protection Act Violation (개인정보 보호법 위반에 따른 행정처분 결과 분석을 통한 공표명령권 도입 연구 395)

  • Jeon, Ju Hyun;Rhee, Kyung Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.395-402
    • /
    • 2022
  • In case of violation of the Personal Information Protection Act, administrative dispositions will be taken according to the legal standards, and the results will be announced. However, the current method has limitations in its effectiveness as repeated administrative dispositions are increasing despite the announcement by the disclosure system of the Personal Information Protection Act. In this paper, we deploy the introduction of the 'public announcement commandment' against violators by analyzing the administrative disposition results according to the violation of the Personal Information Protection Act. It is able to strengthen the existing disclosure system for self-disclose violations by providing easy recognition to the people about the fact of violation itself against the Personal Information Protection Act. Furthermore, we analyze major industries through the industry groups and violations of laws that were subject to publication, and data published on the results of administrative dispositions for violation of the Personal Information Protection Act. Finally, we propose the legal basis for the 'public announcement commandment' which allows the violator to publish by oneself for the announcement of the fact that the corrective action has been taken.

Research on the Quality of Employment Centered on Information Communication Technology Industry

  • Jeong, Soon Ki;Ahn, Jong Chang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.238-247
    • /
    • 2020
  • This study has a purpose to analyze quantitatively whether ICT industry provides the qualitative indicator of employment to attract excellent human resources. We investigate the relationships of labor market conditions among ICT manufacturing, non-ICT manufacturing, ICT services, non-ICT services. Therefore, the quantitative and qualitative indicators of employment (wages, working hours, admission and turnover, involuntary retirement, and the duration years of job) are analyzed for the ICT industry and IT workers. In order to quantitatively analyze qualitative indicators such as employment status and longevity, we used employment statistics. In order to compensate for the limitations of employment insurance data, the comparison analysis with the survey data of economically active population of the National Statistical Office was conducted. As a result of this research, ICT service industry has to improve the working conditions of employees and establish an ecosystem for a lifelong career base to grow as a specialist, need to pursue an investigation for ICT worker career shift, and promote standard labor contracts. In addition, protection of employees, ICT-related job vision and social respect have to be perused.

A plan research about a Ubiquitous RFID infringe private information (유비쿼터스 RFID 개인정보 침해에 대한 방안 연구)

  • Choi, Hee Sik;Park, Jae Pyo;Jun, Mun Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.143-151
    • /
    • 2010
  • RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information, the purpose of Ubiquitous and potential problems in individual privacy in computer environment. In main part, the content will handle the practices and weakness in security of computer environment in Ubiquitous. Last part of presentation going to examine, futuristic views in solving existing problems with alternative solutions to prohibit invasion in privacy.

A Study on the Prospective IT R&D Fields in the Smart Grid Area (스마트그리드산업에서의 유망 IT R&D 분야 도출)

  • Sim, Jin-Bo;Ha, Young-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1416-1427
    • /
    • 2010
  • Except for some fields, Smart Grid-related technology in Korea is considered to be below the level of developed countries. Under this situation, this study is conducted to look into IT technology related to Smart Grid and draw prospective IT R&D fields in the Smart Grid Industry. To seek out prospective IT R&D fields, the two-stage process evaluating economics, political property, and technical validity. According to the result, four fields of (1) sensor, (2) information protection, (3) AMI middleware, (4) electricity management are selected as prospective fields. The sensor and AMI middleware fields focus on development of key technology, so the strategy that launches leading products in global market faster than other countries(Focusing & First Mover Strategy). The information protection felid is divided into the safety technology for the felid electricity network and the personal & corporate information protection technology, and therefore the R&D Sharing strategy is efficient. For the electricity management filed, a strategic alliance for developing component technology of Grid is desirable.

A Design of Analog Voltage-controlled Tunable Active Element for Information Protection (정보 보호용 아날로그 전압조절 가변 능동소자 설계)

  • 송제호;방준호
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1253-1260
    • /
    • 2001
  • In this paper, a new voltage-controlled tunable analog active element for low-voltage applications and information protection is proposed. The proposed active element is composed of the CMOS complementary cascode circuit which can extend transconductance of an element. Therefore, the unity gain frequency which is determined transconductance is increased than that of the conventional element. And then these results are verified by the $0.25\mutextrm{m}$ CMOS n-well parameter HSPICE simulation. As a result, the gain and the unity gain frequency are 42㏈ and 200MHz respectively in the element on 2V supply voltage. And power dissipation of the designed circuit is 0.32mW.

  • PDF

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

HearCAM Embedded Platform Design (히어 캠 임베디드 플랫폼 설계)

  • Hong, Seon Hack;Cho, Kyung Soon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.79-87
    • /
    • 2014
  • In this paper, we implemented the HearCAM platform with Raspberry PI B+ model which is an open source platform. Raspberry PI B+ model consists of dual step-down (buck) power supply with polarity protection circuit and hot-swap protection, Broadcom SoC BCM2835 running at 700MHz, 512MB RAM solered on top of the Broadcom chip, and PI camera serial connector. In this paper, we used the Google speech recognition engine for recognizing the voice characteristics, and implemented the pattern matching with OpenCV software, and extended the functionality of speech ability with SVOX TTS(Text-to-speech) as the matching result talking to the microphone of users. And therefore we implemented the functions of the HearCAM for identifying the voice and pattern characteristics of target image scanning with PI camera with gathering the temperature sensor data under IoT environment. we implemented the speech recognition, pattern matching, and temperature sensor data logging with Wi-Fi wireless communication. And then we directly designed and made the shape of HearCAM with 3D printing technology.

EU's Environmental Regulations and the Countermeasures of the Firm in External Area -Focusing on the Cases in the Electrical and Electronic Industry- (EU 환경규제와 역외기업의 대응 -전기.전자산업의 사례 중심으로-)

  • Myung, Chang-Sig
    • Management & Information Systems Review
    • /
    • v.22
    • /
    • pp.167-191
    • /
    • 2007
  • The EU has introduced various environmental protection policies and regulations which are stricter than accepted international standards. WEEE, RoHS, and EuP directives in the Electrical and Electronic Industry could have a direct effect on our exports to EU countries. To gradually enlarge exports to the EU, it is necessary to have a precise understanding of the EU's environmental regulations and prepare the relevant countermeasures to adequately cope with them. Korean companies should formulate concrete plans to meet the EU's environmental regulations in those industry. In order to decrease the negative effects that environmental regulations of EU give to Korea, the corporations and the government should change their present passive environmental policy and carry out the environmental- friendly policy. If Korean companies can adequately meet the standards set by the environmental policies and regulations of the EU, it will greatly enhance the competitiveness of companies in this market.

  • PDF